Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/03/2023, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe
Resource
win10-20230220-en
General
-
Target
c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe
-
Size
1.5MB
-
MD5
4503522033c72b6c5814d51e513ea440
-
SHA1
3925e8b7cac4f2991735f0feceb248cb231fa620
-
SHA256
c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d
-
SHA512
5b424c690b134b8462e08a4f480a8eb533c0c384df2de6ef6213f22bcc03a79f3ff9f8140ccbe71d211a00a2bcca7fe3ae9b03dc66f2f1f6daf256f618d59aff
-
SSDEEP
24576:rconAINPy/Ca+HVjU3uy5Qnzng57MqD5Xyf0ch3YfPxnjMvvqi1DlWLNhK+Dca+:bRxTJauyinz/qD5Cf0m3YxnjWv1DleNG
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 4320 rundll32.exe 4320 rundll32.exe 4700 rundll32.exe 4700 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3204 wrote to memory of 4128 3204 c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe 66 PID 3204 wrote to memory of 4128 3204 c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe 66 PID 3204 wrote to memory of 4128 3204 c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe 66 PID 4128 wrote to memory of 4320 4128 control.exe 68 PID 4128 wrote to memory of 4320 4128 control.exe 68 PID 4128 wrote to memory of 4320 4128 control.exe 68 PID 4320 wrote to memory of 3076 4320 rundll32.exe 69 PID 4320 wrote to memory of 3076 4320 rundll32.exe 69 PID 3076 wrote to memory of 4700 3076 RunDll32.exe 70 PID 3076 wrote to memory of 4700 3076 RunDll32.exe 70 PID 3076 wrote to memory of 4700 3076 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe"C:\Users\Admin\AppData\Local\Temp\c6639776e4a002df66ef337cb7f68f0ca81b8807545b820790d5b3fa8b8e4a4d.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WULFLb.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WULFLb.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WULFLb.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WULFLb.cPL",5⤵
- Loads dropped DLL
PID:4700
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55be2353af88df497a21801aad0e1f62f
SHA17eda46c7168c2ea3a40499c23c49393713ffb495
SHA25679a78da9823e4e859c2d4dc984d6da56575479acc3806ab4d5b946fa1863aeff
SHA5129de4cd8dd779befd7362e36cce60305071f09354088e15f337d07d791e57c07d648cb6d4794650882dedd38b4f21b1174aec37b93ceacf1d1c59c681f50b8f56
-
Filesize
1.1MB
MD55be2353af88df497a21801aad0e1f62f
SHA17eda46c7168c2ea3a40499c23c49393713ffb495
SHA25679a78da9823e4e859c2d4dc984d6da56575479acc3806ab4d5b946fa1863aeff
SHA5129de4cd8dd779befd7362e36cce60305071f09354088e15f337d07d791e57c07d648cb6d4794650882dedd38b4f21b1174aec37b93ceacf1d1c59c681f50b8f56
-
Filesize
1.1MB
MD55be2353af88df497a21801aad0e1f62f
SHA17eda46c7168c2ea3a40499c23c49393713ffb495
SHA25679a78da9823e4e859c2d4dc984d6da56575479acc3806ab4d5b946fa1863aeff
SHA5129de4cd8dd779befd7362e36cce60305071f09354088e15f337d07d791e57c07d648cb6d4794650882dedd38b4f21b1174aec37b93ceacf1d1c59c681f50b8f56
-
Filesize
1.1MB
MD55be2353af88df497a21801aad0e1f62f
SHA17eda46c7168c2ea3a40499c23c49393713ffb495
SHA25679a78da9823e4e859c2d4dc984d6da56575479acc3806ab4d5b946fa1863aeff
SHA5129de4cd8dd779befd7362e36cce60305071f09354088e15f337d07d791e57c07d648cb6d4794650882dedd38b4f21b1174aec37b93ceacf1d1c59c681f50b8f56
-
Filesize
1.1MB
MD55be2353af88df497a21801aad0e1f62f
SHA17eda46c7168c2ea3a40499c23c49393713ffb495
SHA25679a78da9823e4e859c2d4dc984d6da56575479acc3806ab4d5b946fa1863aeff
SHA5129de4cd8dd779befd7362e36cce60305071f09354088e15f337d07d791e57c07d648cb6d4794650882dedd38b4f21b1174aec37b93ceacf1d1c59c681f50b8f56